Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.148.10.247 botsattack
45.148.10.247/Trojan Linux
2025-11-19 14:09:00
45.148.10.241 attack
DDoS Inbound
2023-11-15 18:54:04
45.148.10.28 attackspam
Oct 13 20:18:40 sshgateway sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
Oct 13 20:18:43 sshgateway sshd\[2360\]: Failed password for root from 45.148.10.28 port 40178 ssh2
Oct 13 20:19:07 sshgateway sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
2020-10-14 02:28:44
45.148.10.15 attackspambots
Bruteforce detected by fail2ban
2020-10-13 21:25:53
45.148.10.186 attackspam
Unable to negotiate with 45.148.10.186 port 47964: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2020-10-13 21:24:21
45.148.10.28 attackbotsspam
SSH Server Abuse (45.148.10.28 as ): 
...
2020-10-13 17:43:00
45.148.10.15 attackbotsspam
Oct 13 05:18:03 server2 sshd\[31409\]: Invalid user user from 45.148.10.15
Oct 13 05:18:48 server2 sshd\[31424\]: Invalid user server from 45.148.10.15
Oct 13 05:19:33 server2 sshd\[31465\]: Invalid user steam from 45.148.10.15
Oct 13 05:20:17 server2 sshd\[31678\]: Invalid user vmware from 45.148.10.15
Oct 13 05:21:00 server2 sshd\[31685\]: Invalid user microsoft from 45.148.10.15
Oct 13 05:21:44 server2 sshd\[31730\]: Invalid user cloud from 45.148.10.15
2020-10-13 12:52:46
45.148.10.186 attackspam
Oct 13 05:33:03 ns308116 sshd[11001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:05 ns308116 sshd[11001]: Failed password for root from 45.148.10.186 port 41866 ssh2
Oct 13 05:33:38 ns308116 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:40 ns308116 sshd[11016]: Failed password for root from 45.148.10.186 port 39380 ssh2
Oct 13 05:34:15 ns308116 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
...
2020-10-13 12:50:57
45.148.10.15 attack
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: Invalid user user from 45.148.10.15
Oct 12 23:36:08 srv-ubuntu-dev3 sshd[31523]: Failed password for invalid user user from 45.148.10.15 port 40704 ssh2
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:40 srv-ubuntu-dev3 sshd[31590]: Failed password for invalid user 123Diego from 45.148.10.15 port 59760 ssh2
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: Invalid user Alphanetworks from 45.148.10.15
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-10-13 05:40:39
45.148.10.186 attack
Fail2Ban
2020-10-13 05:39:02
45.148.10.15 attackbotsspam
Fail2Ban
2020-10-12 05:52:51
45.148.10.65 attackbots
Invalid user ubuntu from 45.148.10.65 port 43138
2020-10-12 05:36:52
45.148.10.15 attack
Brute force attempt
2020-10-11 21:59:38
45.148.10.65 attackspam
Oct 01 10:49:15 host sshd[12378]: Invalid user ubuntu from 45.148.10.65 port 41060
2020-10-11 21:43:21
45.148.10.28 attack
Fail2Ban automatic report:
SSH brute-force:
2020-10-11 21:05:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.10.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33842
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.148.10.77.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091600 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 20:06:43 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 77.10.148.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 77.10.148.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.165 attackbots
Aug 26 15:58:44 ArkNodeAT sshd\[27317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
Aug 26 15:58:45 ArkNodeAT sshd\[27317\]: Failed password for root from 222.186.30.165 port 25600 ssh2
Aug 26 15:58:53 ArkNodeAT sshd\[27322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
2019-08-26 22:02:38
217.61.112.178 attackspam
SMTP invalid logins 107 and blocked 0 Dates: 14-8-2019 till 26-8-2019
2019-08-26 21:12:47
62.102.148.67 attackbotsspam
ssh failed login
2019-08-26 22:03:05
36.238.108.69 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-26 22:05:21
152.168.137.2 attack
Aug 26 09:38:28 TORMINT sshd\[26125\]: Invalid user schuler from 152.168.137.2
Aug 26 09:38:28 TORMINT sshd\[26125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.137.2
Aug 26 09:38:29 TORMINT sshd\[26125\]: Failed password for invalid user schuler from 152.168.137.2 port 55270 ssh2
...
2019-08-26 21:44:56
171.25.193.235 attack
Automatic report - Banned IP Access
2019-08-26 22:00:39
51.255.174.215 attack
2019-08-26T13:55:08.226652abusebot-4.cloudsearch.cf sshd\[11812\]: Invalid user ftpuser from 51.255.174.215 port 46840
2019-08-26 22:09:49
36.236.185.243 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-26 21:45:21
159.89.13.0 attack
Invalid user test from 159.89.13.0 port 41130
2019-08-26 21:22:15
132.145.170.174 attack
Aug 26 03:55:27 mail sshd\[27015\]: Invalid user margarita from 132.145.170.174
Aug 26 03:55:27 mail sshd\[27015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174
...
2019-08-26 21:38:48
101.255.124.212 attackspam
scan z
2019-08-26 21:34:02
37.59.54.90 attack
Aug 26 12:27:58 server sshd\[12928\]: Invalid user lobo from 37.59.54.90 port 51320
Aug 26 12:27:58 server sshd\[12928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.54.90
Aug 26 12:28:00 server sshd\[12928\]: Failed password for invalid user lobo from 37.59.54.90 port 51320 ssh2
Aug 26 12:31:48 server sshd\[12835\]: User root from 37.59.54.90 not allowed because listed in DenyUsers
Aug 26 12:31:48 server sshd\[12835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.54.90  user=root
2019-08-26 21:40:43
121.7.127.92 attackbotsspam
Aug 26 03:48:40 aiointranet sshd\[13403\]: Invalid user ts from 121.7.127.92
Aug 26 03:48:40 aiointranet sshd\[13403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bb121-7-127-92.singnet.com.sg
Aug 26 03:48:42 aiointranet sshd\[13403\]: Failed password for invalid user ts from 121.7.127.92 port 40893 ssh2
Aug 26 03:53:48 aiointranet sshd\[13857\]: Invalid user confluence from 121.7.127.92
Aug 26 03:53:48 aiointranet sshd\[13857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bb121-7-127-92.singnet.com.sg
2019-08-26 21:54:27
51.79.30.160 attackspam
Chat Spam
2019-08-26 21:35:05
222.72.137.236 attackbots
Received: from 222.72.137.236  (HELO 183.79.16.244) (222.72.137.236)
Return-Path: 
Message-ID: 
From: "bfngkqsayukgf@oce6x4icx.biz" 
Reply-To: "pmjhntax@woc1pkze8.biz" 
Subject: 無料プレゼント CAS CAS 95%OFF 夏休みセール
Date: Mon, 26 Aug 2019 15:11:53 +0600
X-Mailer: Microsoft Outlook Express 6.00.2462.0000
2019-08-26 21:42:55

Recently Reported IPs

176.32.33.204 45.141.84.187 185.143.221.94 185.143.221.48
93.174.93.247 176.32.33.196 45.148.10.2 45.141.86.222
45.141.86.78 85.62.188.112 93.174.92.187 45.141.86.37
45.141.86.41 45.141.86.72 45.141.86.13 45.141.86.4
45.141.84.230 45.141.84.180 185.11.146.249 89.248.168.254